Vous êtes sur la page 1sur 6

1 Section A [30 marks / 30 markah]

1. What was the device used to communicate during the early years in Tanah Melayu? ______ 2. Information and Communication Technology can be shortened as ______ 3. Internet was known as _____. A. Killer Net B. Multi Net C. Jaring Net D. ARPANET 4. The microprocessor was invented during the ______ computer era. A. first generation B. third generation C. fourth generation D. second generation 5. ____________ uses computers to experiment new graphic designs with possible interiors. A. An artist B. A scientist C. An architect D. A researcher 6. The first computer that was delivered to the client was ______. A. Mark 1 B. IBM 360 C. UNIVAC D. CDC2600 7. Teachers benefit from the use of computers in schools because computers I. weaken learning II. can enhance interactive learning III. can be used as an effective teaching aids IV. can strengthen cognitive development A. I and III B. II and III C. II, III, and IV D. I, II, III, and I 8. What is a computer system? A. A set of customised software used for accounting. B. A set of computer components on the motherboard. C. A personal computer is not an example of a computer system. D. A set of hardware and software which processes data in a meaningful way 9. Several aspects have been considered as the advantages of the computerised system. They are: I. Time II. Profit III. Productivity IV. Job opportunity A. I and III B. I and IV C. I, II, and III D. I, III, and IV

[LIHAT SEBELAH SULIT

2
10. Match the technology method with the generations given

11. Write True or False for the following statements

NO a. b. c. d. e. f. g. h. i. j. k.

STATEMENT The headman of the village is the one who will announce any news using the beduk. Information and Communication Technology comprises three major elements which are computer, Internet and networking. We need to learn about ICT if we do not want to be left behind. The most powerful personal computers are known as supercomputers. Abacus was first used in Egypt. Nowadays, more people tend to choose real time conversations rather than communicate through online chats. The computer system does not monitor and filter the information which goes through the Internet. Silicone chips were widely used during the third generation Through the Internet, communication with anyone and anywhere in the world is possible. Through the Internet, people from around the world can get news and information instantly. The Internet is the best way to communicate with the people around the world.

TRUE

FALSE

[LIHAT SEBELAH SULIT

Section B [20 marks / 20 markah]


12. Figure 1 below shows symptoms of a computer problem. Rajah 1 di bawah menunjukkan simptom pada sebuah komputer. Screen displays unusual messages Skrin memaparkan mesej pelik Files become corrupted Fail menjadi rosak Files mysteriously appear Muncul fail yang menjadi tanda tanya Figure 1 Rajah 1 Based on the figure above Berdasarkan rajah di atas : (a) Identify the type of computer threat which matches the symptoms. Kenalpasti jenis ancaman komputer yang berpadanan dengan simptom itu. [ 1 marks ] [ 1 markah ] (b) State one different examples of the threat. Nyatakan satu contoh berlainan bagi ancaman itu. [ 1 marks ] [ 1 markah ] (c) Explain one ways to prevent it. Huraikan satu cara untuk mengatasinya.

[ 2 marks ] [ 2 markah ] 13. Figure 2 shows a situation in a banking system. Rajah 2 menunjukkan situasi di dalam sistem bank.

System A Sistem A
Figure 6 Rajah 6

System B Sistem B [LIHAT SEBELAH SULIT

4
Based on Figure 2: Berdasarkan Rajah 2: (a) State the difference between system A and system B. Nyatakan perbezaan di antara sistem A dan sistem B.

[ 2 marks ] [ 2 markah ]

(b) State two reasons why bank clients who use system B should be protected under the Malaysian Cyber Law. Nyatakan dua sebab mengapa pelanggan bank yang menggunakan sistem B harus dilindungi di bawah Undang-undang Siber Malaysia.

[2 marks] [2 markah] 14. Figure 3 is an excerpt from an online newspaper. Rajah 3 menunjukkan petikan daripada akhbar atas talian

The Malaysian Coalition for the Prevention of Child Sexual Abuse (MCPSA) produce statistic that 1.5 millions pornographic website occur in the Internet. Recently former Prime Minister, Tun Dr Mahathir Mohamad suggested to produce a software that can filter pornographic materials in the Internet in this country (modified from Utusan article online, 25 Oktober 2005) Badan Bertindak Kesedaran Penderaan Seksual Kanak-Kanak (MCPSA) mengeluarkan statistik bahawa 1.5 juta laman web pornografi terdapat dalam Internet. Baru-baru ini pula bekas Perdana Menteri, Tun Dr. Mahathir Mohamad mengesyorkan supaya diadakan perisian untuk menyaring bahan-bahan pornografi dalam Internet di negara ini. (diubahsuai dari rencana Utusan online, 25 Oktober 2005)
Figure 3 Rajah 3 Based on the excerpt on Figure 3: Berdasarkan petikan dalam rajah 3: (a) Referring to the statistic by MCPSA on the increasing pornographic website, state two effect of pornographic website on the society Merujuk kepada statistik yang dikeluarkan oleh MCPSA berkenaan pertambahan laman web pornografi, nyatakan dua kesan pertambahan laman web pornografi kepada masyarakat.

[2 marks] [2 markah]

[LIHAT SEBELAH SULIT

5
(b) Explain one suitable process of filtering to filter pornography in the web. Terangkan satu proses penapisan yang sesuai untuk menapis bahan lucah di dalam web.

[2 marks] [2 markah] 15. Figure 4 shows a security procedure done by Affendi. Rajah 4 menunjukkan prosedur keselamatan yang dilaksanakan oleh Affendi.

Figure 4 Rajah 4 Based on Figure 4, Berdasarkan Rajah 4, (a) Name the security procedure. Namakan prosedur keselamatan tersebut. [1 marks] [1 markah] (b) State the steps taken to apply this security procedure. Nyatakan langkah-langkah yang diambil bagi menggunakan prosedur keselamatan ini.

[3 marks] [3 markah]

[LIHAT SEBELAH SULIT

6
16. Millineum Security Sdn. Bhd. is a company that provide back-up data services. The company planned to upgrade the security of several important premises through the information technology method. By applying the new method, only the authorised personnel will be allowed to access those premises. As the head of Information Technology Unit, you have been asked to propose any suitable solution. Millineum Security Sdn. Bhd adalah sebuah syarikat yang menyediakan perkhidmatan perlindungan data. Syarikat itu merancang untuk menaik taraf keselamatan beberapa premis penting melalui kaedah teknologi maklumat. Melalui kaedah baru, hanya kakitangan yang diberi kuasa akan dibenarkan untuk mengakses premis tersebut . Sebagai Ketua Unit Teknologi Maklumat, anda telah diminta untuk mencadangkan apa-apa penyelesaian yang sesuai (a) State and explain briefly one suitable technology for the solution Nyatakan dan terangkan secara ringkas satu teknologi yang sesuai untuk penyelesaian

[2 marks] [2 markah]

(b) State two examples of the selected method Nyatakan dua contoh kaedah yang dipilih

[2 marks] [2 markah]

[LIHAT SEBELAH SULIT

Vous aimerez peut-être aussi